hashlookup / hashlookup-forensic-analyserLinks
Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https://circl.lu/services/hashlookup/
☆126Updated last year
Alternatives and similar repositories for hashlookup-forensic-analyser
Users that are interested in hashlookup-forensic-analyser are comparing it to the libraries listed below
Sorting:
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆131Updated 3 years ago
- A collection of tips for using MISP.☆74Updated 7 months ago
- A toolkit for the post-mortem examination of Docker containers from forensic HDD copies☆104Updated last year
- ☆94Updated 2 months ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆65Updated 2 years ago
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆84Updated 2 months ago
- Collection of Jupyter Notebooks by @fr0gger_☆173Updated last month
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆116Updated last year
- Cisco Orbital - Osquery queries by Talos☆134Updated 11 months ago
- An open source platform to support analysts to organise their case and tasks☆95Updated last week
- BlackBerry Threat Research & Intelligence☆98Updated last year
- TAPIR is a multi-user, client/server, incident response framework☆44Updated 3 years ago
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆73Updated 2 weeks ago
- Digital Forensics Artifacts Knowledge Base☆84Updated last year
- Python library for threat intelligence☆87Updated 6 months ago
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆33Updated last year
- The core backend server handling API requests and task management☆43Updated this week
- ATT&CK Powered Suit is a browser extension that puts the complete MITRE ATT&CK® knowledge base at your fingertips with text search, conte…☆78Updated last month
- Convert Sigma rules to SIEM queries, directly in your browser.☆92Updated last week
- The Threat Actor Profile Guide for CTI Analysts☆110Updated 2 years ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆155Updated 3 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆146Updated last year
- ☆28Updated 4 years ago
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆67Updated last year
- acquire is a tool to quickly gather forensic artifacts from disk images or a live system into a lightweight container.☆107Updated last week
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆83Updated last year
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆35Updated 3 months ago
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆164Updated last year
- MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats☆55Updated last week
- Remote access and Antivirus Logging Database☆42Updated last year